首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   627篇
  免费   93篇
  国内免费   53篇
  2024年   1篇
  2023年   2篇
  2021年   20篇
  2020年   9篇
  2019年   29篇
  2018年   30篇
  2017年   39篇
  2016年   51篇
  2015年   23篇
  2014年   61篇
  2013年   111篇
  2012年   26篇
  2011年   46篇
  2010年   44篇
  2009年   46篇
  2008年   46篇
  2007年   31篇
  2006年   39篇
  2005年   39篇
  2004年   21篇
  2003年   23篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   4篇
  1998年   8篇
  1996年   1篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1990年   2篇
  1989年   1篇
排序方式: 共有773条查询结果,搜索用时 15 毫秒
681.
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security.  相似文献   
682.
郭力萌  朱勤 《国防科技》2017,38(5):050-054
在美国大力推动下,韩日政府于2016年11月签署《军事情报保护协定》。本文对韩日签署《军事情报保护协定》的背景和过程进行了梳理,指出了韩日政府关于该协定所存在的主要分歧,分析了该协定签署对东北亚乃至亚太地缘政治安全形势产生的深远影响。  相似文献   
683.
邵萌 《国防科技》2017,38(5):046-049
随着中国在太空领域的不断崛起,太空地位不断提升的同时,也面临着各种各样的挑战,这些挑战既有源自传统政治领域的大国阻挠,也有来自外太空的人类共同威胁。为了应对这些威胁和挑战,保护中国的太空利益和国家利益,我们需要从多方面着手,多管齐下,以维护日益重要的中国国家太空利益。  相似文献   
684.
程桂龙 《国防科技》2013,(5):59-64,103
“空海一体战”是美国的一种新型作战理论,是在20世纪80年代“空地一体战”等诸多战法及兵种妥协基础上形成的一种新型军事战略,旨在通过空海军力量的配合,进行近域作战,以抵消对手的反进入/区域拒止能力,取得战争的主动权与控制权.“空海一体战”作为美国战略重心东移的重要角力点与支撑要素,在美国亚太战略中的作用举足轻重,对亚太周边国家尤其是中国的国家安全构成重大威胁,为此有必要对其理论渊源、发展目标、策略行动及障碍缺陷进行剖析与解构,为中国维护国家安全,构建良好的国家安全环境提供战略储备与智力支持.  相似文献   
685.
This article presents four challenges to promoting border security in post-Soviet Eurasia, even in those states that have experienced regime change and profess new interest in constructing sound state institutions. The analysis is drawn from the specific example of Georgia—a major recipient of U.S. border security assistance and the site of several intercepted efforts of radioactive materials trafficking—but it is relevant to other states in the region, as well. The challenges assessed are: (1) the gradual nature of border regime reform, (2) trade-offs that subordinate border reform to other developmental priorities, (3) bureaucratic inertia and politics, and (4) the continued existence of unrecognized territories that lie beyond the reach of the state and of international law.  相似文献   
686.
采用HLA技术的装备保障仿真训练系统是通过网络将分散在各地的仿真器、计算机生成兵力以及其他设备联合为一个整体,形成一个可以在时间和空间上互相耦合的虚拟战场环境.分析了装备保障仿真训练的功能和特点,并依据HLA的基本概念、方法和原理对分布式装备保障仿真训练系统进行方案设计,建立了系统体系结构,并介绍了其方案组成.  相似文献   
687.
The issue that this paper tackles is the assessment of the relative security benefits that Cyprus and Greece derive in the context of their cooperation on defence matters. This form of cooperation, known as the ‘Integrated Defence Space Doctrine’, aims at defending their interests in the Aegean Sea and the broader East Mediterranean theatre. The paper relies heavily on earlier research on this topic, which deals with the Greek–Cypriot alliance facing an arms race against Turkey, and uses a coefficient especially designed to assess the optimal levels of security and the associated defence expenditure of the two allies. A comparison of the relative security coefficient values for the two allies suggests that the security benefit that Greece derives thanks to its alliance with Cyprus exceeds the corresponding Cypriot benefit by far. Given the importance assigned to human resources by this index, in conjunction with the demographic problems of Greece, this conclusion justifies the recent Greek defence policy revision, emphasizing quality, capital equipment and flexibility of forces. This revision aims at satisfying the security requirements of the alliance and the increasing demands of an arms race against Turkey.  相似文献   
688.
Guinea-Bissau's transition toward democracy has been violent and disruptive. Despite holding elections and attempts to promote economic and social development, the latest government, under President Yala, is not equipped to bring stability or even a more democratic state. A politicised military, inexperienced opposition and corrupt government officials have contributed to the current poverty and instability. Although unlikely to be deposed by the fragmented opposition, Yala is not secure within his own party and is likely to use his position to weaken his opponents. As a Catholic, Yala has been careful to avoid religious conflict by reassuring Muslim citizens that they will not be marginalised. The economy is precarious and poverty has not been addressed. Guinea-Bissau is dependent on foreign donors for its financial needs. Guinea-Bissau has begun military operations against rebels opposing the Senegalese government and the battles seem likely to continue to cause regional instability. Without external intervention political and economic development looks remote.  相似文献   
689.
690.
Analysis of the failures of African security forces generally focuses on structural issues such as corruption of senior leadership, insufficient equipment and training, and coup d’état fears driving mistrust of armies that are too strong or effective. However, less examined is the role that sub-state identity plays; using Libya, South Sudan, and Mali as case studies, this paper examines how ethnicity inhibits the development of national armies, divides them, and exposes a critical flaw that adversaries are able to exploit. Given the increasingly ethnic nature of conflict throughout the world, and the rising threat that ethnic conflicts in Africa pose to regional and Western partners, it may be prudent for researchers, policymakers and other stakeholders to examine the critical role that sub-state identity plays in undermining African security forces.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号